Search:
Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
---|---|---|---|---|---|---|---|---|---|
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 | false | Harvester v1.4.2 | ip-control-loop | golang.org/x/net@v0.20.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 | false | Harvester v1.4.2 | ip-control-loop | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 | false | Harvester v1.4.2 | ip-control-loop | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 | false | Harvester v1.4.2 | whereabouts | golang.org/x/net@v0.20.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 | false | Harvester v1.4.2 | whereabouts | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 | false | Harvester v1.4.2 | whereabouts | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.8.1 | false | Harvester v1.4.2 | libcrypto3 | libcrypto3@3.3.1-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.8.1 | false | Harvester v1.4.2 | libssl3 | libssl3@3.3.1-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.8.1 | false | Harvester v1.4.2 | kube-vip | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/csi-attacher:v4.7.0 | false | Harvester v1.4.2 | csi-attacher | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-node-driver-registrar:v2.12.0 | false | Harvester v1.4.2 | csi-node-driver-registrar | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-provisioner:v4.0.1-20241007 | false | Harvester v1.4.2 | csi-provisioner | stdlib@v1.21.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-resizer:v1.12.0 | false | Harvester v1.4.2 | csi-resizer | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-snapshotter:v7.0.2-20241007 | false | Harvester v1.4.2 | csi-snapshotter | stdlib@v1.21.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/livenessprobe:v2.14.0 | false | Harvester v1.4.2 | livenessprobe | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-cli:v1.7.2 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-cli:v1.7.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-cli:v1.7.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-cli:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-cli:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/grpc_health_probe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/grpc_health_probe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | bind-utils | bind-utils@9.18.28-150600.3.3.1 | SUSE-SU-2025:0355-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.7.2 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.7.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.7.2 | false | Harvester v1.4.2 | nginx | nginx@1.21.5-150600.8.4 | SUSE-SU-2025:0283-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.45 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.45 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.45 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.45 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.45 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.45 | false | Harvester v1.4.2 | usr/bin/yq | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleet | github.com/go-git/go-git/v5@v5.12.1-0.20240629213349-b00c68ab7140 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleet | github.com/go-git/go-git/v5@v5.12.1-0.20240629213349-b00c68ab7140 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleetcontroller | github.com/go-git/go-git/v5@v5.12.1-0.20240629213349-b00c68ab7140 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleetcontroller | github.com/go-git/go-git/v5@v5.12.1-0.20240629213349-b00c68ab7140 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | git-core | git-core@2.35.3-150300.10.39.1 | SUSE-SU-2024:2656-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitcloner | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitcloner | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitcloner | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitcloner | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitjob | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitjob | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitjob | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitjob | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20241001 | false | Harvester v1.4.2 | pod_nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Harvester v1.4.2 | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | cert-approver | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | kubeconfig_generator | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | thin_entrypoint | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/harvester-networkfs-manager:v0.1.2 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-networkfs-manager:v0.1.2 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-networkfs-manager:v0.1.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-networkfs-manager:v0.1.2 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager-webhook:v0.7.8 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager-webhook:v0.7.8 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager-webhook:v0.7.8 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager-webhook:v0.7.8 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.7.8 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.7.8 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.7.8 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.7.8 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.4.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.4.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.4.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.4.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.4.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.4.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.4.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.4.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.4.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.4.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/kubectl | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/virtctl | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/virtctl | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/virtctl | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.15.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
rancher/harvester-webhook:v1.4.2 | false | Harvester v1.4.2 | usr/bin/harvester-webhook | github.com/rancher/steve@v0.0.0-20240911190153-79304d93b49b | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester:v1.4.2 | false | Harvester v1.4.2 | usr/bin/harvester | github.com/rancher/steve@v0.0.0-20240911190153-79304d93b49b | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.2 | false | Harvester v1.4.2 | bin/kubectl | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | curl | curl@7.79.1-r1 | CVE-2022-32207 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | curl | curl@7.79.1-r1 | CVE-2023-23914 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | curl | curl@7.79.1-r1 | CVE-2022-27781 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | curl | curl@7.79.1-r1 | CVE-2022-27782 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | curl | curl@7.79.1-r1 | CVE-2022-43551 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | curl | curl@7.79.1-r1 | CVE-2023-27533 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | curl | curl@7.79.1-r1 | CVE-2023-27534 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-32207 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcurl | libcurl@7.79.1-r1 | CVE-2023-23914 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-27781 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-27782 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-43551 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcurl | libcurl@7.79.1-r1 | CVE-2023-27533 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libcurl | libcurl@7.79.1-r1 | CVE-2023-27534 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | ncurses-libs | ncurses-libs@6.2_p20210612-r0 | CVE-2022-29458 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | ncurses-terminfo-base | ncurses-terminfo-base@6.2_p20210612-r0 | CVE-2022-29458 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | ruby | ruby@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | ruby-etc | ruby-etc@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | ruby-io-console | ruby-io-console@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | ruby-irb | ruby-irb@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | ruby-libs | ruby-libs@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | zlib | zlib@1.2.12-r1 | CVE-2022-37434 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | activesupport@7.0.3 | CVE-2023-22796 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | google-protobuf@3.20.1 | CVE-2024-7254 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | kubeclient@4.9.1 | CVE-2022-0759 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | opensearch-ruby@1.0.0 | CVE-2022-31115 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2022-30123 | CRITICAL | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2022-30122 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2022-44570 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2022-44571 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2022-44572 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2023-27530 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2024-26141 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2024-26146 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | rack@2.2.3 | CVE-2025-27610 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | tzinfo@1.2.7 | CVE-2022-31163 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.4.2 | Ruby | webrick@1.7.0 | CVE-2024-47220 | HIGH | affected | gemspec | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libcom-err2 | libcom-err2@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libgcrypt20 | libgcrypt20@1.8.7-6 | CVE-2021-33560 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libgnutls30 | libgnutls30@3.7.1-5+deb11u3 | CVE-2024-0553 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libgnutls30 | libgnutls30@3.7.1-5+deb11u3 | CVE-2024-0567 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libldap-2.4-2 | libldap-2.4-2@2.4.57+dfsg-3+deb11u1 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2023-39417 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2023-5869 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2024-0985 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2024-7348 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | libzstd1 | libzstd1@1.4.8+dfsg-2.1 | CVE-2022-4899 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.4.2 | zlib1g | zlib1g@1:1.2.11.dfsg-2+deb11u2 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | ncurses-libs | ncurses-libs@6.3_p20211120-r1 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | ncurses-terminfo-base | ncurses-terminfo-base@6.3_p20211120-r1 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | github.com/elazarl/goproxy@v0.0.0-20220115173737-adb46da277ac | CVE-2023-37788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | github.com/grafana/grafana-plugin-sdk-go@v0.139.0 | CVE-2024-8986 | CRITICAL | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/crypto@v0.0.0-20220622213112-05595931fe9d | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | google.golang.org/grpc@v1.45.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | github.com/elazarl/goproxy@v0.0.0-20220115173737-adb46da277ac | CVE-2023-37788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | github.com/grafana/grafana-plugin-sdk-go@v0.139.0 | CVE-2024-8986 | CRITICAL | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | golang.org/x/crypto@v0.0.0-20220622213112-05595931fe9d | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | google.golang.org/grpc@v1.45.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.4.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.4 | true | Harvester v1.4.2 | kube-webhook-certgen | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.4.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | github.com/prometheus/client_golang@v1.7.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2020-16845 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.4.2 | configmap-reload | stdlib@v1.14.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | busybox | busybox@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | busybox-binsh | busybox-binsh@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | krb5-libs | krb5-libs@1.20.1-r1 | CVE-2024-37371 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | krb5-libs | krb5-libs@1.20.1-r1 | CVE-2024-37370 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | libcrypto3 | libcrypto3@3.1.1-r1 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | libexpat | libexpat@2.5.0-r1 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | libssl3 | libssl3@3.1.1-r1 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | sqlite-libs | sqlite-libs@3.41.2-r2 | CVE-2023-7104 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | ssl_client | ssl_client@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | Python | certifi@2023.5.7 | CVE-2023-37920 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | Python | setuptools@65.5.1 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | Python | setuptools@68.0.0 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.4.2 | Python | urllib3@1.26.16 | CVE-2023-43804 | HIGH | affected | python-pkg | |
rancher/mirrored-kube-logging-logging-operator:4.4.0 | true | Harvester v1.4.2 | manager | golang.org/x/net@v0.12.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-logging-logging-operator:4.4.0 | true | Harvester v1.4.2 | manager | stdlib@v1.20.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-logging-operator:4.4.0 | true | Harvester v1.4.2 | manager | stdlib@v1.20.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-logging-logging-operator:4.4.0 | true | Harvester v1.4.2 | manager | stdlib@v1.20.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-logging-operator:4.4.0 | true | Harvester v1.4.2 | manager | stdlib@v1.20.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-logging-operator:4.4.0 | true | Harvester v1.4.2 | manager | stdlib@v1.20.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Harvester v1.4.2 | kube-state-metrics | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Harvester v1.4.2 | kube-state-metrics | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Harvester v1.4.2 | kube-state-metrics | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Harvester v1.4.2 | kube-state-metrics | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Harvester v1.4.2 | kube-state-metrics | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Harvester v1.4.2 | kube-state-metrics | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.4.2 | curl | curl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.4.2 | curl | curl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.4.2 | libcurl | libcurl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.4.2 | libcurl | libcurl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.4.2 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.4.2 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.4.2 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.4.2 | adapter | stdlib@v1.18.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.4.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.4.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | golang.org/x/net@v0.9.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | golang.org/x/net@v0.9.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.4.2 | bin/operator | stdlib@v1.20.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v8.1.0 | true | Harvester v1.4.2 | snapshot-controller | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0 | true | Harvester v1.4.2 | snapshot-validation-webhook | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | bind-utils | bind-utils@9.18.28-150600.3.3.1 | SUSE-SU-2025:0355-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/agent | github.com/rancher/rancher@v2.10.1 | CVE-2025-23388 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/agent | github.com/rancher/rancher@v2.10.1 | CVE-2025-23389 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | k8s.io/kubernetes@v1.24.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | k8s.io/kubernetes@v1.24.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | k8s.io/kubernetes@v1.24.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/bandwidth | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/cni | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/containerd | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/containerd-shim-runc-v2 | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/etcdctl | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/etcdctl | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/firewall | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/k3s | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/kustomize | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/kustomize | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher | github.com/rancher/rancher@v2.10.1 | CVE-2025-23388 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher | github.com/rancher/rancher@v2.10.1 | CVE-2025-23389 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/runc | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/share/rancher/ui/assets/wins.exe | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/share/rancher/ui/assets/wins.exe | golang.org/x/net@v0.27.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.3.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/helm | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/helm | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/helm | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.3 | CVE-2024-3817 | CRITICAL | affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.3 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.20.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.20.8 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.20.8 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.20.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.20.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kustomize | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kustomize | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kustomize | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | curl | curl@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | libcurl4 | libcurl4@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:2635-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/helm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/support-bundle-kit:v0.0.46 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.46 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.46 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.46 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.46 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.46 | false | Harvester v1.4.2 | usr/bin/yq | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.11-suc | false | Harvester v1.4.2 | usr/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.4.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.4.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.4.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.4.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.4.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.4.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.4.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.4.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.4.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.4.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | bind-utils | bind-utils@9.18.28-150600.3.3.1 | SUSE-SU-2025:0355-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libsoup-3_0-0 | libsoup-3_0-0@3.4.4-150600.1.3 | SUSE-SU-2024:4355-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-pr-helper | qemu-pr-helper@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/libguestfs-tools:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-tools | qemu-tools@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-api:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-controller:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-handler:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu | qemu@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu | qemu@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-accel-tcg-x86 | qemu-accel-tcg-x86@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-accel-tcg-x86 | qemu-accel-tcg-x86@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-hw-usb-host | qemu-hw-usb-host@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-hw-usb-host | qemu-hw-usb-host@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-hw-usb-redirect | qemu-hw-usb-redirect@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-hw-usb-redirect | qemu-hw-usb-redirect@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-img | qemu-img@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-ipxe | qemu-ipxe@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-ipxe | qemu-ipxe@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-ovmf-x86_64 | qemu-ovmf-x86_64@202308-150600.3.1 | SUSE-SU-2025:0421-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-seabios | qemu-seabios@8.2.61.16.3_3_ga95067eb-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-seabios | qemu-seabios@8.2.61.16.3_3_ga95067eb-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-vgabios | qemu-vgabios@8.2.61.16.3_3_ga95067eb-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-vgabios | qemu-vgabios@8.2.61.16.3_3_ga95067eb-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-x86 | qemu-x86@8.2.6-150600.3.9.1 | SUSE-SU-2024:3744-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | qemu-x86 | qemu-x86@8.2.6-150600.3.9.1 | SUSE-SU-2024:4094-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | xen-libs | xen-libs@4.18.2_06-150600.3.3.1 | SUSE-SU-2024:3113-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-launcher:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | xen-libs | xen-libs@4.18.2_06-150600.3.3.1 | SUSE-SU-2024:4163-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.6/virt-operator:1.3.1-150600.5.9.1 | false | Harvester v1.4.2 | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
ghcr.io/kube-vip/kube-vip-iptables:v0.8.1 | false | Harvester v1.4.2 | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
ghcr.io/kube-vip/kube-vip-iptables:v0.8.1 | false | Harvester v1.4.2 | kube-vip | golang.org/x/net@v0.25.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/backing-image-manager:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/backing-image-manager | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-attacher:v4.7.0 | false | Harvester v1.4.2 | csi-attacher | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-node-driver-registrar:v2.12.0 | false | Harvester v1.4.2 | csi-node-driver-registrar | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-provisioner:v4.0.1-20241007 | false | Harvester v1.4.2 | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-resizer:v1.12.0 | false | Harvester v1.4.2 | csi-resizer | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-snapshotter:v7.0.2-20241007 | false | Harvester v1.4.2 | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/livenessprobe:v2.14.0 | false | Harvester v1.4.2 | livenessprobe | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-cli:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/longhornctl | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
longhornio/longhorn-cli:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/longhornctl-local | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/longhorn | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-engine:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/longhorn-instance-manager | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-instance-manager:v1.7.2 | false | Harvester v1.4.2 | usr/local/bin/longhorn-instance-manager | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | usr/local/sbin/longhorn-manager | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-manager:v1.7.2 | false | Harvester v1.4.2 | usr/local/sbin/longhorn-manager | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-share-manager:v1.7.2 | false | Harvester v1.4.2 | longhorn-share-manager | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/support-bundle-kit:v0.0.45 | false | Harvester v1.4.2 | usr/bin/yq | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet-agent:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleetagent | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet-agent:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleetagent | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleet | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleetcontroller | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet:v0.11.2 | false | Harvester v1.4.2 | usr/bin/fleetcontroller | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitcloner | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitcloner | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitjob | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.4.2 | usr/bin/gitjob | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Harvester v1.4.2 | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Harvester v1.4.2 | cluster-proportional-autoscaler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Harvester v1.4.2 | opt/cni/bin/dhcp | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Harvester v1.4.2 | coredns | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Harvester v1.4.2 | coredns | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Harvester v1.4.2 | node-cache | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Harvester v1.4.2 | node-cache | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Harvester v1.4.2 | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Harvester v1.4.2 | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Harvester v1.4.2 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Harvester v1.4.2 | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Harvester v1.4.2 | opt/bin/flanneld | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Harvester v1.4.2 | opt/bin/flanneld | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20241008 | false | Harvester v1.4.2 | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20241008 | false | Harvester v1.4.2 | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-proxy | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kubeadm | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kubeadm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.4-rke2r1-build20241212 | false | Harvester v1.4.2 | usr/local/bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Harvester v1.4.2 | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-eventrouter:v0.3.3 | false | Harvester v1.4.2 | usr/bin/eventrouter | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-eventrouter:v0.3.3 | false | Harvester v1.4.2 | usr/bin/eventrouter | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer-webhook:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer-webhook | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer:v0.4.4 | false | Harvester v1.4.2 | usr/bin/harvester-load-balancer | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-controller:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-controller | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-helper:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-helper | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-webhook:v0.5.6 | false | Harvester v1.4.2 | usr/bin/harvester-network-webhook | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | usr/bin/harvester-node-manager-webhook | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-manager-webhook:v0.3.3 | false | Harvester v1.4.2 | usr/bin/harvester-node-manager-webhook | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-manager:v0.3.3 | false | Harvester v1.4.2 | usr/bin/harvester-node-manager | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-pcidevices:v0.4.1 | false | Harvester v1.4.2 | bin/pcidevices | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-pcidevices:v0.4.1 | false | Harvester v1.4.2 | bin/pcidevices | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-seeder:v0.4.1 | false | Harvester v1.4.2 | bin/manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-seeder:v0.4.1 | false | Harvester v1.4.2 | bin/manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/wharfie | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/wharfie | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-upgrade:v1.4.2 | false | Harvester v1.4.2 | usr/bin/wharfie | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-vm-import-controller:v0.4.1 | false | Harvester v1.4.2 | usr/bin/vm-import-controller | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-webhook:v1.4.2 | false | Harvester v1.4.2 | usr/bin/harvester-webhook | github.com/rancher/rancher@v0.0.0-20240919204204-3da2ae0cabd1 | CVE-2019-12274 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-webhook:v1.4.2 | false | Harvester v1.4.2 | usr/bin/harvester-webhook | github.com/rancher/rancher@v0.0.0-20240919204204-3da2ae0cabd1 | CVE-2021-36775 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester:v1.4.2 | false | Harvester v1.4.2 | usr/bin/harvester | github.com/rancher/rancher@v0.0.0-20240919204204-3da2ae0cabd1 | CVE-2019-12274 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester:v1.4.2 | false | Harvester v1.4.2 | usr/bin/harvester | github.com/rancher/rancher@v0.0.0-20240919204204-3da2ae0cabd1 | CVE-2021-36775 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | usr/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Harvester v1.4.2 | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-lb:v0.4.9 | false | Harvester v1.4.2 | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.9 | false | Harvester v1.4.2 | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/kubectl:v1.29.2 | false | Harvester v1.4.2 | bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cluster-api-controller:v1.8.3 | true | Harvester v1.4.2 | manager | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cluster-api-controller:v1.8.3 | true | Harvester v1.4.2 | manager | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kube-logging-logging-operator:4.4.0 | true | Harvester v1.4.2 | manager | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/alertmanager | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.26.0 | true | Harvester v1.4.2 | bin/amtool | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | github.com/docker/docker@v24.0.2+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/prometheus | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | github.com/docker/docker@v24.0.2+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-prometheus:v2.45.0 | true | Harvester v1.4.2 | bin/promtool | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.1.0 | true | Harvester v1.4.2 | snapshot-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0 | true | Harvester v1.4.2 | snapshot-validation-webhook | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Harvester v1.4.2 | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/agent | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/agent | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/agent | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.10.1 | false | Harvester v1.4.2 | usr/bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-webhook:v0.6.2 | false | Harvester v1.4.2 | usr/bin/webhook | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-webhook:v0.6.2 | false | Harvester v1.4.2 | usr/bin/webhook | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | k8s.io/kubernetes@v1.24.10 | CVE-2023-3676 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | k8s.io/kubernetes@v1.24.10 | CVE-2023-3955 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | k8s.io/kubernetes@v1.24.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/containerd | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/containerd | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/helm_v3 | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/helm_v3 | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/k3s | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/k3s | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher-machine | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/rancher-machine | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/telemetry | github.com/rancher/norman@v0.0.0-20210709145327-afd06f533ca3 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/telemetry | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.1 | false | Harvester v1.4.2 | usr/bin/telemetry | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Harvester v1.4.2 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Harvester v1.4.2 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/crictl | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.4-rke2r1 | false | Harvester v1.4.2 | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/helm | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/helm | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/helm | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/k9s | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.24 | false | Harvester v1.4.2 | usr/local/bin/kubectl | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/helm | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/helm | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/helm | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/docker/docker@v26.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/k9s | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.4.2 | usr/local/bin/kubectl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | github.com/docker/docker@v26.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/k9s | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Harvester v1.4.2 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/support-bundle-kit:v0.0.46 | false | Harvester v1.4.2 | usr/bin/yq | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-agent-installer-rancher:v2.10.1 | false | Harvester v1.4.2 | helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent-installer-rancher:v2.10.1 | false | Harvester v1.4.2 | helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-agent:v0.3.11-suc | false | Harvester v1.4.2 | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.11-suc | false | Harvester v1.4.2 | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.11-suc | false | Harvester v1.4.2 | usr/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-upgrade-controller:v0.14.2 | false | Harvester v1.4.2 | bin/system-upgrade-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.4.2 | snapshot-controller | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.4.2 | snapshot-validation-webhook | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |